0% found this document useful (0 votes)
63 views24 pages

Jncie

Bridging addresses problems with large shared Ethernet LANs by dividing them into smaller collision domains using microsegmentation. It builds a forwarding table to make intelligent forwarding decisions by comparing frame MAC addresses. Learning populates the table by examining frame source MAC addresses to associate ports. Forwarding uses the table to send traffic out the port of the destination MAC address. If unknown, it floods the frame to all ports.

Uploaded by

Shahzaib Raza
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
63 views24 pages

Jncie

Bridging addresses problems with large shared Ethernet LANs by dividing them into smaller collision domains using microsegmentation. It builds a forwarding table to make intelligent forwarding decisions by comparing frame MAC addresses. Learning populates the table by examining frame source MAC addresses to associate ports. Forwarding uses the table to send traffic out the port of the destination MAC address. If unknown, it floods the frame to all ports.

Uploaded by

Shahzaib Raza
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 24

JNCIS-ENT Routing Study Guide

© 2012 Juniper Networks, Inc. All rights reserved. Layer 2 Switching • Chapter 1–3
How Does Bridging Work?
Defined in the IEEE 802.1D-2004 standard, bridging addresses some of the inherent
problems of large shared Ethernet LANs.
Bridging uses microsegmentation to divide a single collision domain into multiple,
smaller bridged collision domains. Reducing
the size of a collision domain effectively reduces the likelihood that collisions will occur.
This approach also enhances
performance by allowing multiple streams of data to flow through the switch within a
common LAN or broadcast domain.
Bridging allows a mixed collection of interface types and speeds to be logically grouped
within the same bridged LAN. The ability
to logically group dissimilar interfaces in a bridged LAN environment provides design
flexibility not found in a shared Ethernet
LAN environment.
Bridging builds and maintains a forwarding table, known as a bridge table, for all
destinations within the bridged LAN. The
switch populates the bridge table based on the source MAC address of incoming frames
received from devices participating in
the bridged LAN. The switch makes an intelligent forwarding decision by comparing the
destination MAC address of incoming
frames to the contents of the bridge table. This approach reduces unnecessary traffic on
the LAN. As shown on the graphic,
several mechanisms contribute to the bridging process. We cover the listed bridging
mechanisms in detail on subsequent
graphics.
JNCIS-ENT Routing Study Guide
Chapter 1–4 • Layer 2 Switching © 2012 Juniper Networks, Inc. All rights reserved.
Learning
When a switch is first connected to an Ethernet LAN, it has no information about the
devices connected to the network. Learning
is the process a switch uses to obtain the MAC addresses of nodes on the network. The
switch stores all learned MAC address in
the bridge table. To learn MAC addresses, the switch examines the Ethernet header
information of all received frames from the
LAN, looking for source MAC addresses of sending nodes. The switch places learned
MAC addresses into its bridge table, along
with two other pieces of information—the interface (or port) on which the traffic was
received and the time when the MAC
address was learned. The port information is used to forward traffic to its intended
destination (forwarding mechanism) while
the timestamp information is used to keep the bridge table up-to-date (aging
mechanism). We discuss the forwarding and aging
mechanisms in detail on subsequent pages in this section.
Note that MAC learning can be disabled on individual interfaces on EX Series switches.
The command used to disable MAC
learning follows:
{master:0}[edit]
user@Switch# set ethernet-switching-options interfaces ge-0/0/0.0 no?
Possible completions:
no-mac-learning Disable mac learning for this interface
JNCIS-ENT Routing Study Guide
© 2012 Juniper Networks, Inc. All rights reserved. Layer 2 Switching • Chapter 1–5
Forwarding: Part 1
The forwarding mechanism is used by the switch to deliver traffic, passing it from an
incoming interface to an outgoing interface
that leads to (or toward) the destination. To forward frames, the switch consults the
bridge table to see whether the table
contains the MAC address corresponding to the frames’ destination. If the bridge table
contains an entry for the desired
destination address, the switch sends the traffic out the interface associated with the
MAC address. The switch also consults
the bridge table in the same way when transmitting frames that originate on devices
connected directly to the switch. If the
switch does not have a MAC entry in its bridge table, it floods the frame out all other
interfaces belonging to the same broadcast
domain (VLAN) as the interface on which the frame was received. The frame is not sent
back out the ingress interface.
JNCIS-ENT Routing Study Guide
Chapter 1–6 • Layer 2 Switching © 2012 Juniper Networks, Inc. All rights reserved.
Forwarding: Part 2
To forward frames, the switch consults the bridge table to see whether the table
contains the MAC address corresponding to the
frames’ destination. The bridge table is organized by VLAN to ensure Layer 2 traffic is
only forwarded out switch ports belonging
to the same broadcast domain (VLAN) as the interface on which the frame was
received.
JNCIS-ENT Routing Study Guide
© 2012 Juniper Networks, Inc. All rights reserved. Layer 2 Switching • Chapter 1–7
Flooding
Flooding is a transparent mechanism used to deliver packets to unknown MAC
addresses. If the bridging table has no entry for
a particular destination MAC address or if the packet received is a broadcast or
multicast packet, the switch floods the traffic
out all interfaces except the interface on which it was received. (If traffic originates on
the switch, the switch floods that traffic
out all interfaces.) When an unknown destination responds to traffic that has been
flooded through a switch, the switch learns
the MAC address of that node and updates its bridge table with the source MAC
address and ingress port.
JNCIS-ENT Routing Study Guide
Chapter 1–8 • Layer 2 Switching © 2012 Juniper Networks, Inc. All rights reserved.
Filtering
The filtering mechanism is used to limit traffic to its associated segment or switch port.
As the number of entries in the bridge
table grows, the switch pieces together an increasingly complete picture of the
individual network segments—the picture
clarifies which switch ports are used to forward traffic to a specific node. The switch
uses this information to filter traffic.
The graphic illustrates how a switch filters traffic. In this example the device associated
with User B sends traffic destined to the
device associated with User C (MAC address 00:26:88:02:74:88). Because the
destination MAC address 00:26:88:02:74:88 is
also associated with ge-0/0/7, the switch filters or discards the traffic.
JNCIS-ENT Routing Study Guide
© 2012 Juniper Networks, Inc. All rights reserved. Layer 2 Switching • Chapter 1–9
Aging
Finally, the switch uses aging to ensure that only active MAC address entries are in the
bridge table. For each MAC address in
the bridge table, the switch records a timestamp of when the information about the
network node was learned. Each time the
switch detects traffic from a MAC address, it updates the timestamp. A timer on the
switch periodically checks the timestamp; if
the timestamp is older than a user-configured value, the switch removes the node’s
MAC address from the bridge table. The
default aging timer interval is 300 seconds and can be configured for all VLANs or on a
per-VLAN basis as shown here:
{master:0}[edit]
user@switch# set ethernet-switching-options mac-table-aging-time ?
Possible completions:
<mac-table-aging-time> MAC aging time (60..1000000 seconds)
{master:0}[edit]
user@switch# set vlans vlan-name mac-table-aging-time ?
Possible completions:
<mac-table-aging-time> MAC aging time (60..1000000 seconds)
JNCIS-ENT Routing Study Guide
Chapter 1–10 • Layer 2 Switching © 2012 Juniper Networks, Inc. All rights reserved.
Think About It
This graphic is designed to get you to think about the recently described concepts and
mechanisms. This graphic illustrates a
network topology where shared and switched LANs are merged. When User B sends
traffic, the hub to which User B is
connected floods the traffic out all ports. Based on this knowledge we know that the
traffic will be received by User D and User
C even though the traffic is intended for User D.
Multiple Layers
Switched networks are often hierarchical and consist of multiple layers. The diagram on
the graphic illustrates the typical layers,
which include access, aggregation (or distribution), and core. Each of these layers
performs unique responsibilities.
Hierarchical networks are designed in a modular fashion. This inherent modularity
facilitates change and makes this design
option quite scalable. When working with a hierarchical network, the individual elements
can be replicated as the network
JNCIS-ENT Routing Study Guide
© 2012 Juniper Networks, Inc. All rights reserved. Layer 2 Switching • Chapter 1–11
grows. The cost and complexity of network changes is generally confined to a specific
portion (or layer) of the network rather
than to the entire network.
Because functions are mapped to individual layers, faults relating to a specific function
can be isolated to that function’s
corresponding layer. The ability to isolate faults to a specific layer can greatly simplify
troubleshooting efforts
JNCIS-ENT Routing Study Guide
© 2012 Juniper Networks, Inc. All rights reserved. Layer 2 Switching • Chapter 1–3
How Does Bridging Work?
Defined in the IEEE 802.1D-2004 standard, bridging addresses some of the inherent
problems of large shared Ethernet LANs.
Bridging uses microsegmentation to divide a single collision domain into multiple,
smaller bridged collision domains. Reducing
the size of a collision domain effectively reduces the likelihood that collisions will occur.
This approach also enhances
performance by allowing multiple streams of data to flow through the switch within a
common LAN or broadcast domain.
Bridging allows a mixed collection of interface types and speeds to be logically grouped
within the same bridged LAN. The ability
to logically group dissimilar interfaces in a bridged LAN environment provides design
flexibility not found in a shared Ethernet
LAN environment.
Bridging builds and maintains a forwarding table, known as a bridge table, for all
destinations within the bridged LAN. The
switch populates the bridge table based on the source MAC address of incoming frames
received from devices participating in
the bridged LAN. The switch makes an intelligent forwarding decision by comparing the
destination MAC address of incoming
frames to the contents of the bridge table. This approach reduces unnecessary traffic on
the LAN. As shown on the graphic,
several mechanisms contribute to the bridging process. We cover the listed bridging
mechanisms in detail on subsequent
graphics.
JNCIS-ENT Routing Study Guide
Chapter 1–4 • Layer 2 Switching © 2012 Juniper Networks, Inc. All rights reserved.
Learning
When a switch is first connected to an Ethernet LAN, it has no information about the
devices connected to the network. Learning
is the process a switch uses to obtain the MAC addresses of nodes on the network. The
switch stores all learned MAC address in
the bridge table. To learn MAC addresses, the switch examines the Ethernet header
information of all received frames from the
LAN, looking for source MAC addresses of sending nodes. The switch places learned
MAC addresses into its bridge table, along
with two other pieces of information—the interface (or port) on which the traffic was
received and the time when the MAC
address was learned. The port information is used to forward traffic to its intended
destination (forwarding mechanism) while
the timestamp information is used to keep the bridge table up-to-date (aging
mechanism). We discuss the forwarding and aging
mechanisms in detail on subsequent pages in this section.
Note that MAC learning can be disabled on individual interfaces on EX Series switches.
The command used to disable MAC
learning follows:
{master:0}[edit]
user@Switch# set ethernet-switching-options interfaces ge-0/0/0.0 no?
Possible completions:
no-mac-learning Disable mac learning for this interface
JNCIS-ENT Routing Study Guide
© 2012 Juniper Networks, Inc. All rights reserved. Layer 2 Switching • Chapter 1–5
Forwarding: Part 1
The forwarding mechanism is used by the switch to deliver traffic, passing it from an
incoming interface to an outgoing interface
that leads to (or toward) the destination. To forward frames, the switch consults the
bridge table to see whether the table
contains the MAC address corresponding to the frames’ destination. If the bridge table
contains an entry for the desired
destination address, the switch sends the traffic out the interface associated with the
MAC address. The switch also consults
the bridge table in the same way when transmitting frames that originate on devices
connected directly to the switch. If the
switch does not have a MAC entry in its bridge table, it floods the frame out all other
interfaces belonging to the same broadcast
domain (VLAN) as the interface on which the frame was received. The frame is not sent
back out the ingress interface.
JNCIS-ENT Routing Study Guide
Chapter 1–6 • Layer 2 Switching © 2012 Juniper Networks, Inc. All rights reserved.
Forwarding: Part 2
To forward frames, the switch consults the bridge table to see whether the table
contains the MAC address corresponding to the
frames’ destination. The bridge table is organized by VLAN to ensure Layer 2 traffic is
only forwarded out switch ports belonging
to the same broadcast domain (VLAN) as the interface on which the frame was
received.
JNCIS-ENT Routing Study Guide
© 2012 Juniper Networks, Inc. All rights reserved. Layer 2 Switching • Chapter 1–7
Flooding
Flooding is a transparent mechanism used to deliver packets to unknown MAC
addresses. If the bridging table has no entry for
a particular destination MAC address or if the packet received is a broadcast or
multicast packet, the switch floods the traffic
out all interfaces except the interface on which it was received. (If traffic originates on
the switch, the switch floods that traffic
out all interfaces.) When an unknown destination responds to traffic that has been
flooded through a switch, the switch learns
the MAC address of that node and updates its bridge table with the source MAC
address and ingress port.
JNCIS-ENT Routing Study Guide
Chapter 1–8 • Layer 2 Switching © 2012 Juniper Networks, Inc. All rights reserved.
Filtering
The filtering mechanism is used to limit traffic to its associated segment or switch port.
As the number of entries in the bridge
table grows, the switch pieces together an increasingly complete picture of the
individual network segments—the picture
clarifies which switch ports are used to forward traffic to a specific node. The switch
uses this information to filter traffic.
The graphic illustrates how a switch filters traffic. In this example the device associated
with User B sends traffic destined to the
device associated with User C (MAC address 00:26:88:02:74:88). Because the
destination MAC address 00:26:88:02:74:88 is
also associated with ge-0/0/7, the switch filters or discards the traffic.
JNCIS-ENT Routing Study Guide
© 2012 Juniper Networks, Inc. All rights reserved. Layer 2 Switching • Chapter 1–9
Aging
Finally, the switch uses aging to ensure that only active MAC address entries are in the
bridge table. For each MAC address in
the bridge table, the switch records a timestamp of when the information about the
network node was learned. Each time the
switch detects traffic from a MAC address, it updates the timestamp. A timer on the
switch periodically checks the timestamp; if
the timestamp is older than a user-configured value, the switch removes the node’s
MAC address from the bridge table. The
default aging timer interval is 300 seconds and can be configured for all VLANs or on a
per-VLAN basis as shown here:
{master:0}[edit]
user@switch# set ethernet-switching-options mac-table-aging-time ?
Possible completions:
<mac-table-aging-time> MAC aging time (60..1000000 seconds)
{master:0}[edit]
user@switch# set vlans vlan-name mac-table-aging-time ?
Possible completions:
<mac-table-aging-time> MAC aging time (60..1000000 seconds)
JNCIS-ENT Routing Study Guide
Chapter 1–10 • Layer 2 Switching © 2012 Juniper Networks, Inc. All rights reserved.
Think About It
This graphic is designed to get you to think about the recently described concepts and
mechanisms. This graphic illustrates a
network topology where shared and switched LANs are merged. When User B sends
traffic, the hub to which User B is
connected floods the traffic out all ports. Based on this knowledge we know that the
traffic will be received by User D and User
C even though the traffic is intended for User D.
Multiple Layers
Switched networks are often hierarchical and consist of multiple layers. The diagram on
the graphic illustrates the typical layers,
which include access, aggregation (or distribution), and core. Each of these layers
performs unique responsibilities.
Hierarchical networks are designed in a modular fashion. This inherent modularity
facilitates change and makes this design
option quite scalable. When working with a hierarchical network, the individual elements
can be replicated as the network
JNCIS-ENT Routing Study Guide
© 2012 Juniper Networks, Inc. All rights reserved. Layer 2 Switching • Chapter 1–11
grows. The cost and complexity of network changes is generally confined to a specific
portion (or layer) of the network rather
than to the entire network.
Because functions are mapped to individual layers, faults relating to a specific function
can be isolated to that function’s
corresponding layer. The ability to isolate faults to a specific layer can greatly simplify
troubleshooting efforts
JNCIS-ENT Routing Study Guide
© 2012 Juniper Networks, Inc. All rights reserved. Layer 2 Switching • Chapter 1–3
How Does Bridging Work?
Defined in the IEEE 802.1D-2004 standard, bridging addresses some of the inherent
problems of large shared Ethernet LANs.
Bridging uses microsegmentation to divide a single collision domain into multiple,
smaller bridged collision domains. Reducing
the size of a collision domain effectively reduces the likelihood that collisions will occur.
This approach also enhances
performance by allowing multiple streams of data to flow through the switch within a
common LAN or broadcast domain.
Bridging allows a mixed collection of interface types and speeds to be logically grouped
within the same bridged LAN. The ability
to logically group dissimilar interfaces in a bridged LAN environment provides design
flexibility not found in a shared Ethernet
LAN environment.
Bridging builds and maintains a forwarding table, known as a bridge table, for all
destinations within the bridged LAN. The
switch populates the bridge table based on the source MAC address of incoming frames
received from devices participating in
the bridged LAN. The switch makes an intelligent forwarding decision by comparing the
destination MAC address of incoming
frames to the contents of the bridge table. This approach reduces unnecessary traffic on
the LAN. As shown on the graphic,
several mechanisms contribute to the bridging process. We cover the listed bridging
mechanisms in detail on subsequent
graphics.
JNCIS-ENT Routing Study Guide
Chapter 1–4 • Layer 2 Switching © 2012 Juniper Networks, Inc. All rights reserved.
Learning
When a switch is first connected to an Ethernet LAN, it has no information about the
devices connected to the network. Learning
is the process a switch uses to obtain the MAC addresses of nodes on the network. The
switch stores all learned MAC address in
the bridge table. To learn MAC addresses, the switch examines the Ethernet header
information of all received frames from the
LAN, looking for source MAC addresses of sending nodes. The switch places learned
MAC addresses into its bridge table, along
with two other pieces of information—the interface (or port) on which the traffic was
received and the time when the MAC
address was learned. The port information is used to forward traffic to its intended
destination (forwarding mechanism) while
the timestamp information is used to keep the bridge table up-to-date (aging
mechanism). We discuss the forwarding and aging
mechanisms in detail on subsequent pages in this section.
Note that MAC learning can be disabled on individual interfaces on EX Series switches.
The command used to disable MAC
learning follows:
{master:0}[edit]
user@Switch# set ethernet-switching-options interfaces ge-0/0/0.0 no?
Possible completions:
no-mac-learning Disable mac learning for this interface
JNCIS-ENT Routing Study Guide
© 2012 Juniper Networks, Inc. All rights reserved. Layer 2 Switching • Chapter 1–5
Forwarding: Part 1
The forwarding mechanism is used by the switch to deliver traffic, passing it from an
incoming interface to an outgoing interface
that leads to (or toward) the destination. To forward frames, the switch consults the
bridge table to see whether the table
contains the MAC address corresponding to the frames’ destination. If the bridge table
contains an entry for the desired
destination address, the switch sends the traffic out the interface associated with the
MAC address. The switch also consults
the bridge table in the same way when transmitting frames that originate on devices
connected directly to the switch. If the
switch does not have a MAC entry in its bridge table, it floods the frame out all other
interfaces belonging to the same broadcast
domain (VLAN) as the interface on which the frame was received. The frame is not sent
back out the ingress interface.
JNCIS-ENT Routing Study Guide
Chapter 1–6 • Layer 2 Switching © 2012 Juniper Networks, Inc. All rights reserved.
Forwarding: Part 2
To forward frames, the switch consults the bridge table to see whether the table
contains the MAC address corresponding to the
frames’ destination. The bridge table is organized by VLAN to ensure Layer 2 traffic is
only forwarded out switch ports belonging
to the same broadcast domain (VLAN) as the interface on which the frame was
received.
JNCIS-ENT Routing Study Guide
© 2012 Juniper Networks, Inc. All rights reserved. Layer 2 Switching • Chapter 1–7
Flooding
Flooding is a transparent mechanism used to deliver packets to unknown MAC
addresses. If the bridging table has no entry for
a particular destination MAC address or if the packet received is a broadcast or
multicast packet, the switch floods the traffic
out all interfaces except the interface on which it was received. (If traffic originates on
the switch, the switch floods that traffic
out all interfaces.) When an unknown destination responds to traffic that has been
flooded through a switch, the switch learns
the MAC address of that node and updates its bridge table with the source MAC
address and ingress port.
JNCIS-ENT Routing Study Guide
Chapter 1–8 • Layer 2 Switching © 2012 Juniper Networks, Inc. All rights reserved.
Filtering
The filtering mechanism is used to limit traffic to its associated segment or switch port.
As the number of entries in the bridge
table grows, the switch pieces together an increasingly complete picture of the
individual network segments—the picture
clarifies which switch ports are used to forward traffic to a specific node. The switch
uses this information to filter traffic.
The graphic illustrates how a switch filters traffic. In this example the device associated
with User B sends traffic destined to the
device associated with User C (MAC address 00:26:88:02:74:88). Because the
destination MAC address 00:26:88:02:74:88 is
also associated with ge-0/0/7, the switch filters or discards the traffic.
JNCIS-ENT Routing Study Guide
© 2012 Juniper Networks, Inc. All rights reserved. Layer 2 Switching • Chapter 1–9
Aging
Finally, the switch uses aging to ensure that only active MAC address entries are in the
bridge table. For each MAC address in
the bridge table, the switch records a timestamp of when the information about the
network node was learned. Each time the
switch detects traffic from a MAC address, it updates the timestamp. A timer on the
switch periodically checks the timestamp; if
the timestamp is older than a user-configured value, the switch removes the node’s
MAC address from the bridge table. The
default aging timer interval is 300 seconds and can be configured for all VLANs or on a
per-VLAN basis as shown here:
{master:0}[edit]
user@switch# set ethernet-switching-options mac-table-aging-time ?
Possible completions:
<mac-table-aging-time> MAC aging time (60..1000000 seconds)
{master:0}[edit]
user@switch# set vlans vlan-name mac-table-aging-time ?
Possible completions:
<mac-table-aging-time> MAC aging time (60..1000000 seconds)
JNCIS-ENT Routing Study Guide
Chapter 1–10 • Layer 2 Switching © 2012 Juniper Networks, Inc. All rights reserved.
Think About It
This graphic is designed to get you to think about the recently described concepts and
mechanisms. This graphic illustrates a
network topology where shared and switched LANs are merged. When User B sends
traffic, the hub to which User B is
connected floods the traffic out all ports. Based on this knowledge we know that the
traffic will be received by User D and User
C even though the traffic is intended for User D.
Multiple Layers
Switched networks are often hierarchical and consist of multiple layers. The diagram on
the graphic illustrates the typical layers,
which include access, aggregation (or distribution), and core. Each of these layers
performs unique responsibilities.
Hierarchical networks are designed in a modular fashion. This inherent modularity
facilitates change and makes this design
option quite scalable. When working with a hierarchical network, the individual elements
can be replicated as the network
JNCIS-ENT Routing Study Guide
© 2012 Juniper Networks, Inc. All rights reserved. Layer 2 Switching • Chapter 1–11
grows. The cost and complexity of network changes is generally confined to a specific
portion (or layer) of the network rather
than to the entire network.
Because functions are mapped to individual layers, faults relating to a specific function
can be isolated to that function’s
corresponding layer. The ability to isolate faults to a specific layer can greatly simplify
troubleshooting efforts
JNCIS-ENT Routing Study Guide
© 2012 Juniper Networks, Inc. All rights reserved. Layer 2 Switching • Chapter 1–3
How Does Bridging Work?
Defined in the IEEE 802.1D-2004 standard, bridging addresses some of the inherent
problems of large shared Ethernet LANs.
Bridging uses microsegmentation to divide a single collision domain into multiple,
smaller bridged collision domains. Reducing
the size of a collision domain effectively reduces the likelihood that collisions will occur.
This approach also enhances
performance by allowing multiple streams of data to flow through the switch within a
common LAN or broadcast domain.
Bridging allows a mixed collection of interface types and speeds to be logically grouped
within the same bridged LAN. The ability
to logically group dissimilar interfaces in a bridged LAN environment provides design
flexibility not found in a shared Ethernet
LAN environment.
Bridging builds and maintains a forwarding table, known as a bridge table, for all
destinations within the bridged LAN. The
switch populates the bridge table based on the source MAC address of incoming frames
received from devices participating in
the bridged LAN. The switch makes an intelligent forwarding decision by comparing the
destination MAC address of incoming
frames to the contents of the bridge table. This approach reduces unnecessary traffic on
the LAN. As shown on the graphic,
several mechanisms contribute to the bridging process. We cover the listed bridging
mechanisms in detail on subsequent
graphics.
JNCIS-ENT Routing Study Guide
Chapter 1–4 • Layer 2 Switching © 2012 Juniper Networks, Inc. All rights reserved.
Learning
When a switch is first connected to an Ethernet LAN, it has no information about the
devices connected to the network. Learning
is the process a switch uses to obtain the MAC addresses of nodes on the network. The
switch stores all learned MAC address in
the bridge table. To learn MAC addresses, the switch examines the Ethernet header
information of all received frames from the
LAN, looking for source MAC addresses of sending nodes. The switch places learned
MAC addresses into its bridge table, along
with two other pieces of information—the interface (or port) on which the traffic was
received and the time when the MAC
address was learned. The port information is used to forward traffic to its intended
destination (forwarding mechanism) while
the timestamp information is used to keep the bridge table up-to-date (aging
mechanism). We discuss the forwarding and aging
mechanisms in detail on subsequent pages in this section.
Note that MAC learning can be disabled on individual interfaces on EX Series switches.
The command used to disable MAC
learning follows:
{master:0}[edit]
user@Switch# set ethernet-switching-options interfaces ge-0/0/0.0 no?
Possible completions:
no-mac-learning Disable mac learning for this interface
JNCIS-ENT Routing Study Guide
© 2012 Juniper Networks, Inc. All rights reserved. Layer 2 Switching • Chapter 1–5
Forwarding: Part 1
The forwarding mechanism is used by the switch to deliver traffic, passing it from an
incoming interface to an outgoing interface
that leads to (or toward) the destination. To forward frames, the switch consults the
bridge table to see whether the table
contains the MAC address corresponding to the frames’ destination. If the bridge table
contains an entry for the desired
destination address, the switch sends the traffic out the interface associated with the
MAC address. The switch also consults
the bridge table in the same way when transmitting frames that originate on devices
connected directly to the switch. If the
switch does not have a MAC entry in its bridge table, it floods the frame out all other
interfaces belonging to the same broadcast
domain (VLAN) as the interface on which the frame was received. The frame is not sent
back out the ingress interface.
JNCIS-ENT Routing Study Guide
Chapter 1–6 • Layer 2 Switching © 2012 Juniper Networks, Inc. All rights reserved.
Forwarding: Part 2
To forward frames, the switch consults the bridge table to see whether the table
contains the MAC address corresponding to the
frames’ destination. The bridge table is organized by VLAN to ensure Layer 2 traffic is
only forwarded out switch ports belonging
to the same broadcast domain (VLAN) as the interface on which the frame was
received.
JNCIS-ENT Routing Study Guide
© 2012 Juniper Networks, Inc. All rights reserved. Layer 2 Switching • Chapter 1–7
Flooding
Flooding is a transparent mechanism used to deliver packets to unknown MAC
addresses. If the bridging table has no entry for
a particular destination MAC address or if the packet received is a broadcast or
multicast packet, the switch floods the traffic
out all interfaces except the interface on which it was received. (If traffic originates on
the switch, the switch floods that traffic
out all interfaces.) When an unknown destination responds to traffic that has been
flooded through a switch, the switch learns
the MAC address of that node and updates its bridge table with the source MAC
address and ingress port.
JNCIS-ENT Routing Study Guide
Chapter 1–8 • Layer 2 Switching © 2012 Juniper Networks, Inc. All rights reserved.
Filtering
The filtering mechanism is used to limit traffic to its associated segment or switch port.
As the number of entries in the bridge
table grows, the switch pieces together an increasingly complete picture of the
individual network segments—the picture
clarifies which switch ports are used to forward traffic to a specific node. The switch
uses this information to filter traffic.
The graphic illustrates how a switch filters traffic. In this example the device associated
with User B sends traffic destined to the
device associated with User C (MAC address 00:26:88:02:74:88). Because the
destination MAC address 00:26:88:02:74:88 is
also associated with ge-0/0/7, the switch filters or discards the traffic.
JNCIS-ENT Routing Study Guide
© 2012 Juniper Networks, Inc. All rights reserved. Layer 2 Switching • Chapter 1–9
Aging
Finally, the switch uses aging to ensure that only active MAC address entries are in the
bridge table. For each MAC address in
the bridge table, the switch records a timestamp of when the information about the
network node was learned. Each time the
switch detects traffic from a MAC address, it updates the timestamp. A timer on the
switch periodically checks the timestamp; if
the timestamp is older than a user-configured value, the switch removes the node’s
MAC address from the bridge table. The
default aging timer interval is 300 seconds and can be configured for all VLANs or on a
per-VLAN basis as shown here:
{master:0}[edit]
user@switch# set ethernet-switching-options mac-table-aging-time ?
Possible completions:
<mac-table-aging-time> MAC aging time (60..1000000 seconds)
{master:0}[edit]
user@switch# set vlans vlan-name mac-table-aging-time ?
Possible completions:
<mac-table-aging-time> MAC aging time (60..1000000 seconds)
JNCIS-ENT Routing Study Guide
Chapter 1–10 • Layer 2 Switching © 2012 Juniper Networks, Inc. All rights reserved.
Think About It
This graphic is designed to get you to think about the recently described concepts and
mechanisms. This graphic illustrates a
network topology where shared and switched LANs are merged. When User B sends
traffic, the hub to which User B is
connected floods the traffic out all ports. Based on this knowledge we know that the
traffic will be received by User D and User
C even though the traffic is intended for User D.
Multiple Layers
Switched networks are often hierarchical and consist of multiple layers. The diagram on
the graphic illustrates the typical layers,
which include access, aggregation (or distribution), and core. Each of these layers
performs unique responsibilities.
Hierarchical networks are designed in a modular fashion. This inherent modularity
facilitates change and makes this design
option quite scalable. When working with a hierarchical network, the individual elements
can be replicated as the network
JNCIS-ENT Routing Study Guide
© 2012 Juniper Networks, Inc. All rights reserved. Layer 2 Switching • Chapter 1–11
grows. The cost and complexity of network changes is generally confined to a specific
portion (or layer) of the network rather
than to the entire network.
Because functions are mapped to individual layers, faults relating to a specific function
can be isolated to that function’s
corresponding layer. The ability to isolate faults to a specific layer can greatly simplify
troubleshooting efforts
JNCIS-ENT Routing Study Guide
© 2012 Juniper Networks, Inc. All rights reserved. Layer 2 Switching • Chapter 1–3
How Does Bridging Work?
Defined in the IEEE 802.1D-2004 standard, bridging addresses some of the inherent
problems of large shared Ethernet LANs.
Bridging uses microsegmentation to divide a single collision domain into multiple,
smaller bridged collision domains. Reducing
the size of a collision domain effectively reduces the likelihood that collisions will occur.
This approach also enhances
performance by allowing multiple streams of data to flow through the switch within a
common LAN or broadcast domain.
Bridging allows a mixed collection of interface types and speeds to be logically grouped
within the same bridged LAN. The ability
to logically group dissimilar interfaces in a bridged LAN environment provides design
flexibility not found in a shared Ethernet
LAN environment.
Bridging builds and maintains a forwarding table, known as a bridge table, for all
destinations within the bridged LAN. The
switch populates the bridge table based on the source MAC address of incoming frames
received from devices participating in
the bridged LAN. The switch makes an intelligent forwarding decision by comparing the
destination MAC address of incoming
frames to the contents of the bridge table. This approach reduces unnecessary traffic on
the LAN. As shown on the graphic,
several mechanisms contribute to the bridging process. We cover the listed bridging
mechanisms in detail on subsequent
graphics.
JNCIS-ENT Routing Study Guide
Chapter 1–4 • Layer 2 Switching © 2012 Juniper Networks, Inc. All rights reserved.
Learning
When a switch is first connected to an Ethernet LAN, it has no information about the
devices connected to the network. Learning
is the process a switch uses to obtain the MAC addresses of nodes on the network. The
switch stores all learned MAC address in
the bridge table. To learn MAC addresses, the switch examines the Ethernet header
information of all received frames from the
LAN, looking for source MAC addresses of sending nodes. The switch places learned
MAC addresses into its bridge table, along
with two other pieces of information—the interface (or port) on which the traffic was
received and the time when the MAC
address was learned. The port information is used to forward traffic to its intended
destination (forwarding mechanism) while
the timestamp information is used to keep the bridge table up-to-date (aging
mechanism). We discuss the forwarding and aging
mechanisms in detail on subsequent pages in this section.
Note that MAC learning can be disabled on individual interfaces on EX Series switches.
The command used to disable MAC
learning follows:
{master:0}[edit]
user@Switch# set ethernet-switching-options interfaces ge-0/0/0.0 no?
Possible completions:
no-mac-learning Disable mac learning for this interface
JNCIS-ENT Routing Study Guide
© 2012 Juniper Networks, Inc. All rights reserved. Layer 2 Switching • Chapter 1–5
Forwarding: Part 1
The forwarding mechanism is used by the switch to deliver traffic, passing it from an
incoming interface to an outgoing interface
that leads to (or toward) the destination. To forward frames, the switch consults the
bridge table to see whether the table
contains the MAC address corresponding to the frames’ destination. If the bridge table
contains an entry for the desired
destination address, the switch sends the traffic out the interface associated with the
MAC address. The switch also consults
the bridge table in the same way when transmitting frames that originate on devices
connected directly to the switch. If the
switch does not have a MAC entry in its bridge table, it floods the frame out all other
interfaces belonging to the same broadcast
domain (VLAN) as the interface on which the frame was received. The frame is not sent
back out the ingress interface.
JNCIS-ENT Routing Study Guide
Chapter 1–6 • Layer 2 Switching © 2012 Juniper Networks, Inc. All rights reserved.
Forwarding: Part 2
To forward frames, the switch consults the bridge table to see whether the table
contains the MAC address corresponding to the
frames’ destination. The bridge table is organized by VLAN to ensure Layer 2 traffic is
only forwarded out switch ports belonging
to the same broadcast domain (VLAN) as the interface on which the frame was
received.
JNCIS-ENT Routing Study Guide
© 2012 Juniper Networks, Inc. All rights reserved. Layer 2 Switching • Chapter 1–7
Flooding
Flooding is a transparent mechanism used to deliver packets to unknown MAC
addresses. If the bridging table has no entry for
a particular destination MAC address or if the packet received is a broadcast or
multicast packet, the switch floods the traffic
out all interfaces except the interface on which it was received. (If traffic originates on
the switch, the switch floods that traffic
out all interfaces.) When an unknown destination responds to traffic that has been
flooded through a switch, the switch learns
the MAC address of that node and updates its bridge table with the source MAC
address and ingress port.
JNCIS-ENT Routing Study Guide
Chapter 1–8 • Layer 2 Switching © 2012 Juniper Networks, Inc. All rights reserved.
Filtering
The filtering mechanism is used to limit traffic to its associated segment or switch port.
As the number of entries in the bridge
table grows, the switch pieces together an increasingly complete picture of the
individual network segments—the picture
clarifies which switch ports are used to forward traffic to a specific node. The switch
uses this information to filter traffic.
The graphic illustrates how a switch filters traffic. In this example the device associated
with User B sends traffic destined to the
device associated with User C (MAC address 00:26:88:02:74:88). Because the
destination MAC address 00:26:88:02:74:88 is
also associated with ge-0/0/7, the switch filters or discards the traffic.
JNCIS-ENT Routing Study Guide
© 2012 Juniper Networks, Inc. All rights reserved. Layer 2 Switching • Chapter 1–9
Aging
Finally, the switch uses aging to ensure that only active MAC address entries are in the
bridge table. For each MAC address in
the bridge table, the switch records a timestamp of when the information about the
network node was learned. Each time the
switch detects traffic from a MAC address, it updates the timestamp. A timer on the
switch periodically checks the timestamp; if
the timestamp is older than a user-configured value, the switch removes the node’s
MAC address from the bridge table. The
default aging timer interval is 300 seconds and can be configured for all VLANs or on a
per-VLAN basis as shown here:
{master:0}[edit]
user@switch# set ethernet-switching-options mac-table-aging-time ?
Possible completions:
<mac-table-aging-time> MAC aging time (60..1000000 seconds)
{master:0}[edit]
user@switch# set vlans vlan-name mac-table-aging-time ?
Possible completions:
<mac-table-aging-time> MAC aging time (60..1000000 seconds)
JNCIS-ENT Routing Study Guide
Chapter 1–10 • Layer 2 Switching © 2012 Juniper Networks, Inc. All rights reserved.
Think About It
This graphic is designed to get you to think about the recently described concepts and
mechanisms. This graphic illustrates a
network topology where shared and switched LANs are merged. When User B sends
traffic, the hub to which User B is
connected floods the traffic out all ports. Based on this knowledge we know that the
traffic will be received by User D and User
C even though the traffic is intended for User D.
Multiple Layers
Switched networks are often hierarchical and consist of multiple layers. The diagram on
the graphic illustrates the typical layers,
which include access, aggregation (or distribution), and core. Each of these layers
performs unique responsibilities.
Hierarchical networks are designed in a modular fashion. This inherent modularity
facilitates change and makes this design
option quite scalable. When working with a hierarchical network, the individual elements
can be replicated as the network
JNCIS-ENT Routing Study Guide
© 2012 Juniper Networks, Inc. All rights reserved. Layer 2 Switching • Chapter 1–11
grows. The cost and complexity of network changes is generally confined to a specific
portion (or layer) of the network rather
than to the entire network.
Because functions are mapped to individual layers, faults relating to a specific function
can be isolated to that function’s
corresponding layer. The ability to isolate faults to a specific layer can greatly simplify
troubleshooting efforts
JNCIS-ENT Routing Study Guide
© 2012 Juniper Networks, Inc. All rights reserved. Layer 2 Switching • Chapter 1–3
How Does Bridging Work?
Defined in the IEEE 802.1D-2004 standard, bridging addresses some of the inherent
problems of large shared Ethernet LANs.
Bridging uses microsegmentation to divide a single collision domain into multiple,
smaller bridged collision domains. Reducing
the size of a collision domain effectively reduces the likelihood that collisions will occur.
This approach also enhances
performance by allowing multiple streams of data to flow through the switch within a
common LAN or broadcast domain.
Bridging allows a mixed collection of interface types and speeds to be logically grouped
within the same bridged LAN. The ability
to logically group dissimilar interfaces in a bridged LAN environment provides design
flexibility not found in a shared Ethernet
LAN environment.
Bridging builds and maintains a forwarding table, known as a bridge table, for all
destinations within the bridged LAN. The
switch populates the bridge table based on the source MAC address of incoming frames
received from devices participating in
the bridged LAN. The switch makes an intelligent forwarding decision by comparing the
destination MAC address of incoming
frames to the contents of the bridge table. This approach reduces unnecessary traffic on
the LAN. As shown on the graphic,
several mechanisms contribute to the bridging process. We cover the listed bridging
mechanisms in detail on subsequent
graphics.
JNCIS-ENT Routing Study Guide
Chapter 1–4 • Layer 2 Switching © 2012 Juniper Networks, Inc. All rights reserved.
Learning
When a switch is first connected to an Ethernet LAN, it has no information about the
devices connected to the network. Learning
is the process a switch uses to obtain the MAC addresses of nodes on the network. The
switch stores all learned MAC address in
the bridge table. To learn MAC addresses, the switch examines the Ethernet header
information of all received frames from the
LAN, looking for source MAC addresses of sending nodes. The switch places learned
MAC addresses into its bridge table, along
with two other pieces of information—the interface (or port) on which the traffic was
received and the time when the MAC
address was learned. The port information is used to forward traffic to its intended
destination (forwarding mechanism) while
the timestamp information is used to keep the bridge table up-to-date (aging
mechanism). We discuss the forwarding and aging
mechanisms in detail on subsequent pages in this section.
Note that MAC learning can be disabled on individual interfaces on EX Series switches.
The command used to disable MAC
learning follows:
{master:0}[edit]
user@Switch# set ethernet-switching-options interfaces ge-0/0/0.0 no?
Possible completions:
no-mac-learning Disable mac learning for this interface
JNCIS-ENT Routing Study Guide
© 2012 Juniper Networks, Inc. All rights reserved. Layer 2 Switching • Chapter 1–5
Forwarding: Part 1
The forwarding mechanism is used by the switch to deliver traffic, passing it from an
incoming interface to an outgoing interface
that leads to (or toward) the destination. To forward frames, the switch consults the
bridge table to see whether the table
contains the MAC address corresponding to the frames’ destination. If the bridge table
contains an entry for the desired
destination address, the switch sends the traffic out the interface associated with the
MAC address. The switch also consults
the bridge table in the same way when transmitting frames that originate on devices
connected directly to the switch. If the
switch does not have a MAC entry in its bridge table, it floods the frame out all other
interfaces belonging to the same broadcast
domain (VLAN) as the interface on which the frame was received. The frame is not sent
back out the ingress interface.
JNCIS-ENT Routing Study Guide
Chapter 1–6 • Layer 2 Switching © 2012 Juniper Networks, Inc. All rights reserved.
Forwarding: Part 2
To forward frames, the switch consults the bridge table to see whether the table
contains the MAC address corresponding to the
frames’ destination. The bridge table is organized by VLAN to ensure Layer 2 traffic is
only forwarded out switch ports belonging
to the same broadcast domain (VLAN) as the interface on which the frame was
received.
JNCIS-ENT Routing Study Guide
© 2012 Juniper Networks, Inc. All rights reserved. Layer 2 Switching • Chapter 1–7
Flooding
Flooding is a transparent mechanism used to deliver packets to unknown MAC
addresses. If the bridging table has no entry for
a particular destination MAC address or if the packet received is a broadcast or
multicast packet, the switch floods the traffic
out all interfaces except the interface on which it was received. (If traffic originates on
the switch, the switch floods that traffic
out all interfaces.) When an unknown destination responds to traffic that has been
flooded through a switch, the switch learns
the MAC address of that node and updates its bridge table with the source MAC
address and ingress port.
JNCIS-ENT Routing Study Guide
Chapter 1–8 • Layer 2 Switching © 2012 Juniper Networks, Inc. All rights reserved.
Filtering
The filtering mechanism is used to limit traffic to its associated segment or switch port.
As the number of entries in the bridge
table grows, the switch pieces together an increasingly complete picture of the
individual network segments—the picture
clarifies which switch ports are used to forward traffic to a specific node. The switch
uses this information to filter traffic.
The graphic illustrates how a switch filters traffic. In this example the device associated
with User B sends traffic destined to the
device associated with User C (MAC address 00:26:88:02:74:88). Because the
destination MAC address 00:26:88:02:74:88 is
also associated with ge-0/0/7, the switch filters or discards the traffic.
JNCIS-ENT Routing Study Guide
© 2012 Juniper Networks, Inc. All rights reserved. Layer 2 Switching • Chapter 1–9
Aging
Finally, the switch uses aging to ensure that only active MAC address entries are in the
bridge table. For each MAC address in
the bridge table, the switch records a timestamp of when the information about the
network node was learned. Each time the
switch detects traffic from a MAC address, it updates the timestamp. A timer on the
switch periodically checks the timestamp; if
the timestamp is older than a user-configured value, the switch removes the node’s
MAC address from the bridge table. The
default aging timer interval is 300 seconds and can be configured for all VLANs or on a
per-VLAN basis as shown here:
{master:0}[edit]
user@switch# set ethernet-switching-options mac-table-aging-time ?
Possible completions:
<mac-table-aging-time> MAC aging time (60..1000000 seconds)
{master:0}[edit]
user@switch# set vlans vlan-name mac-table-aging-time ?
Possible completions:
<mac-table-aging-time> MAC aging time (60..1000000 seconds)
JNCIS-ENT Routing Study Guide
Chapter 1–10 • Layer 2 Switching © 2012 Juniper Networks, Inc. All rights reserved.
Think About It
This graphic is designed to get you to think about the recently described concepts and
mechanisms. This graphic illustrates a
network topology where shared and switched LANs are merged. When User B sends
traffic, the hub to which User B is
connected floods the traffic out all ports. Based on this knowledge we know that the
traffic will be received by User D and User
C even though the traffic is intended for User D.
Multiple Layers
Switched networks are often hierarchical and consist of multiple layers. The diagram on
the graphic illustrates the typical layers,
which include access, aggregation (or distribution), and core. Each of these layers
performs unique responsibilities.
Hierarchical networks are designed in a modular fashion. This inherent modularity
facilitates change and makes this design
option quite scalable. When working with a hierarchical network, the individual elements
can be replicated as the network
JNCIS-ENT Routing Study Guide
© 2012 Juniper Networks, Inc. All rights reserved. Layer 2 Switching • Chapter 1–11
grows. The cost and complexity of network changes is generally confined to a specific
portion (or layer) of the network rather
than to the entire network.
Because functions are mapped to individual layers, faults relating to a specific function
can be isolated to that function’s
corresponding layer. The ability to isolate faults to a specific layer can greatly simplify
troubleshooting efforts
JNCIS-ENT Routing Study Guide
© 2012 Juniper Networks, Inc. All rights reserved. Layer 2 Switching • Chapter 1–3
How Does Bridging Work?
Defined in the IEEE 802.1D-2004 standard, bridging addresses some of the inherent
problems of large shared Ethernet LANs.
Bridging uses microsegmentation to divide a single collision domain into multiple,
smaller bridged collision domains. Reducing
the size of a collision domain effectively reduces the likelihood that collisions will occur.
This approach also enhances
performance by allowing multiple streams of data to flow through the switch within a
common LAN or broadcast domain.
Bridging allows a mixed collection of interface types and speeds to be logically grouped
within the same bridged LAN. The ability
to logically group dissimilar interfaces in a bridged LAN environment provides design
flexibility not found in a shared Ethernet
LAN environment.
Bridging builds and maintains a forwarding table, known as a bridge table, for all
destinations within the bridged LAN. The
switch populates the bridge table based on the source MAC address of incoming frames
received from devices participating in
the bridged LAN. The switch makes an intelligent forwarding decision by comparing the
destination MAC address of incoming
frames to the contents of the bridge table. This approach reduces unnecessary traffic on
the LAN. As shown on the graphic,
several mechanisms contribute to the bridging process. We cover the listed bridging
mechanisms in detail on subsequent
graphics.
JNCIS-ENT Routing Study Guide
Chapter 1–4 • Layer 2 Switching © 2012 Juniper Networks, Inc. All rights reserved.
Learning
When a switch is first connected to an Ethernet LAN, it has no information about the
devices connected to the network. Learning
is the process a switch uses to obtain the MAC addresses of nodes on the network. The
switch stores all learned MAC address in
the bridge table. To learn MAC addresses, the switch examines the Ethernet header
information of all received frames from the
LAN, looking for source MAC addresses of sending nodes. The switch places learned
MAC addresses into its bridge table, along
with two other pieces of information—the interface (or port) on which the traffic was
received and the time when the MAC
address was learned. The port information is used to forward traffic to its intended
destination (forwarding mechanism) while
the timestamp information is used to keep the bridge table up-to-date (aging
mechanism). We discuss the forwarding and aging
mechanisms in detail on subsequent pages in this section.
Note that MAC learning can be disabled on individual interfaces on EX Series switches.
The command used to disable MAC
learning follows:
{master:0}[edit]
user@Switch# set ethernet-switching-options interfaces ge-0/0/0.0 no?
Possible completions:
no-mac-learning Disable mac learning for this interface
JNCIS-ENT Routing Study Guide
© 2012 Juniper Networks, Inc. All rights reserved. Layer 2 Switching • Chapter 1–5
Forwarding: Part 1
The forwarding mechanism is used by the switch to deliver traffic, passing it from an
incoming interface to an outgoing interface
that leads to (or toward) the destination. To forward frames, the switch consults the
bridge table to see whether the table
contains the MAC address corresponding to the frames’ destination. If the bridge table
contains an entry for the desired
destination address, the switch sends the traffic out the interface associated with the
MAC address. The switch also consults
the bridge table in the same way when transmitting frames that originate on devices
connected directly to the switch. If the
switch does not have a MAC entry in its bridge table, it floods the frame out all other
interfaces belonging to the same broadcast
domain (VLAN) as the interface on which the frame was received. The frame is not sent
back out the ingress interface.
JNCIS-ENT Routing Study Guide
Chapter 1–6 • Layer 2 Switching © 2012 Juniper Networks, Inc. All rights reserved.
Forwarding: Part 2
To forward frames, the switch consults the bridge table to see whether the table
contains the MAC address corresponding to the
frames’ destination. The bridge table is organized by VLAN to ensure Layer 2 traffic is
only forwarded out switch ports belonging
to the same broadcast domain (VLAN) as the interface on which the frame was
received.
JNCIS-ENT Routing Study Guide
© 2012 Juniper Networks, Inc. All rights reserved. Layer 2 Switching • Chapter 1–7
Flooding
Flooding is a transparent mechanism used to deliver packets to unknown MAC
addresses. If the bridging table has no entry for
a particular destination MAC address or if the packet received is a broadcast or
multicast packet, the switch floods the traffic
out all interfaces except the interface on which it was received. (If traffic originates on
the switch, the switch floods that traffic
out all interfaces.) When an unknown destination responds to traffic that has been
flooded through a switch, the switch learns
the MAC address of that node and updates its bridge table with the source MAC
address and ingress port.
JNCIS-ENT Routing Study Guide
Chapter 1–8 • Layer 2 Switching © 2012 Juniper Networks, Inc. All rights reserved.
Filtering
The filtering mechanism is used to limit traffic to its associated segment or switch port.
As the number of entries in the bridge
table grows, the switch pieces together an increasingly complete picture of the
individual network segments—the picture
clarifies which switch ports are used to forward traffic to a specific node. The switch
uses this information to filter traffic.
The graphic illustrates how a switch filters traffic. In this example the device associated
with User B sends traffic destined to the
device associated with User C (MAC address 00:26:88:02:74:88). Because the
destination MAC address 00:26:88:02:74:88 is
also associated with ge-0/0/7, the switch filters or discards the traffic.
JNCIS-ENT Routing Study Guide
© 2012 Juniper Networks, Inc. All rights reserved. Layer 2 Switching • Chapter 1–9
Aging
Finally, the switch uses aging to ensure that only active MAC address entries are in the
bridge table. For each MAC address in
the bridge table, the switch records a timestamp of when the information about the
network node was learned. Each time the
switch detects traffic from a MAC address, it updates the timestamp. A timer on the
switch periodically checks the timestamp; if
the timestamp is older than a user-configured value, the switch removes the node’s
MAC address from the bridge table. The
default aging timer interval is 300 seconds and can be configured for all VLANs or on a
per-VLAN basis as shown here:
{master:0}[edit]
user@switch# set ethernet-switching-options mac-table-aging-time ?
Possible completions:
<mac-table-aging-time> MAC aging time (60..1000000 seconds)
{master:0}[edit]
user@switch# set vlans vlan-name mac-table-aging-time ?
Possible completions:
<mac-table-aging-time> MAC aging time (60..1000000 seconds)
JNCIS-ENT Routing Study Guide
Chapter 1–10 • Layer 2 Switching © 2012 Juniper Networks, Inc. All rights reserved.
Think About It
This graphic is designed to get you to think about the recently described concepts and
mechanisms. This graphic illustrates a
network topology where shared and switched LANs are merged. When User B sends
traffic, the hub to which User B is
connected floods the traffic out all ports. Based on this knowledge we know that the
traffic will be received by User D and User
C even though the traffic is intended for User D.
Multiple Layers
Switched networks are often hierarchical and consist of multiple layers. The diagram on
the graphic illustrates the typical layers,
which include access, aggregation (or distribution), and core. Each of these layers
performs unique responsibilities.
Hierarchical networks are designed in a modular fashion. This inherent modularity
facilitates change and makes this design
option quite scalable. When working with a hierarchical network, the individual elements
can be replicated as the network
JNCIS-ENT Routing Study Guide
© 2012 Juniper Networks, Inc. All rights reserved. Layer 2 Switching • Chapter 1–11
grows. The cost and complexity of network changes is generally confined to a specific
portion (or layer) of the network rather
than to the entire network.
Because functions are mapped to individual layers, faults relating to a specific function
can be isolated to that function’s
corresponding layer. The ability to isolate faults to a specific layer can greatly simplify
troubleshooting efforts

You might also like